In last week’s post, we gave a high level overview of vulnerability assessments. This type of assessment results in a prioritized list of vulnerabilities in your deployment. It’s an excellent first step in knowing the state of your deployment. The next step you should take is to conduct a penetration test. The Test A penetration…

Last week, we tackled the basics of monitoring your AWS deployment. This week we’re going to shift gears and take a look at encryption. Data Drives Your Business Your business runs on data and information. One of the biggest concerns about moving to the public cloud is the safety of that data. With a little due…